Releases: simonw/s3-credentials
Releases · simonw/s3-credentials
0.8
s3-credentials create my-bucket --public
option for creating public buckets, which allow anyone with knowledge of a filename to download that file. This works by attaching this public bucket policy to the bucket after it is created. #42s3-credentials put-object
now sets theContent-Type
header on the uploaded object. The type is detected based on the filename, or can be specified using the new--content-type
option. #43s3-credentials policy my-bucket --public-bucket
outputs the public bucket policy that would be attached to a bucket of that name. #44
0.7
0.6
0.5
- New
s3-credentials create --duration 20m
option. This creates temporary credentials that only last for the specified time, by creating a role and usingSTS.AssignRole()
to retrieve credentials. #27 - Redesigned read-only and read-write policies to no longer use wildcards and instead explicitly list allowed actions. #15
- Commands now accept an optional
--auth file/path.json
option to specify a JSON or INI file containing the credentials to use. #29 - New
s3-credentials list-buckets --details
option to include ACLs, website configuration and bucket policies. #22 - New
s3-credentials create --format ini
option for outputting INI format instead of JSON. #17 - Now uses
botocore.stub
in some of the tests - thanks, Niko Abeler. #16 - Added integration tests, run using
pytest --integration
, which exercise the tool against an AWS account and delete any created resources afterwards. #30 - Added tips section to the README, including how to access CloudTrail
0.4
0.3
0.2
0.1
- Initial release
s3-credentials create name-of-bucket
creates a new user with read-write access only to the specified S3 bucket, creates an access key for that user and outputs it to the console. #3s3-credentials list-users
lists all of the users for the current AWS account. #4s3-credentials list-user-policies
lists inline policies for the specifeid users, or all users. #5s3-credentials whoami
shows information about the currently authenticated user.